next up previous contents index
Next: System and product assessment Up: Applicationssystems and products Previous: Alternative techniques

Conclusions

 

From the examples above, it is quite evident that voice verification can represent an advantageous additional layer for user authentication. It is also clear that the success of such an implementation relies on an adequate design and engineering of the application, including multiple layer decisions, error recovery strategies and ergonomical considerations. At this stage, additional alternative techniques can also be integrated, for increased security. The future outcome of voice verification techniques from a commercial point of view is certainly strongly connected to requirements in application design.



EAGLES SWLG SoftEdition, May 1997. Get the book...